Which of the following descriptions about viruses and Trojans are correct? (multiple choices)
Under the CLI command, which of the following commands can be used to view the AV engine and virus database version?
URL filtering technology can perform URL access control on users according to different time objects and address objects to achieve precise management of users.
The purpose of the Internet behavior.
Which of the following options is correct for the description of the Anti DDoS system configuration?
The security management system is only optional, and anti-virus software or anti-hacking technology can be a good defense against network threats.
Huawei's USG000 product can identify the true type of common files and over-check the content. Even if the file is hidden in a compressed file, or change the extension
The name of the exhibition can't escape the fiery eyes of the firewall.
Regarding the description of keywords, which of the following is correct? (multiple choice)
Use BGP protocol to achieve diversion, the configuration command is as follows
[sysname] route-policy 1 permit node 1
[sysname-route-policy] apply community no-advertise
[sysname-route-policy] quit
[sysname]bgp100
155955cc-666171a2-20fac832-0c042c04
29
[sysname-bgp] peer
[sysname-bgp] import-route unr
[sysname- bgpl ipv4-family unicast
[sysname-bgp-af-ipv4] peer 7.7.1.2 route-policy 1 export
[sysname-bgp-af-ipv4] peer 7.7. 1.2 advertise community
[sysname-bgp-af-ipv4] quit
[sysname-bgp]quit
Which of the following options is correct for the description of BGP diversion configuration? (multiple choice)
Which three aspects should be considered in the design of cloud platform security solutions? (multiple choice)
Which patches does Policy Center support to management?(Choose 3 answers)
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
Huawei Free Exams |
---|
![]() |